Virtual ad blocking on a computing device

    公开(公告)号:US11509688B1

    公开(公告)日:2022-11-22

    申请号:US16452019

    申请日:2019-06-25

    Inventor: Saurabh Shintre

    Abstract: Virtual ad blocking on a computing device. In some embodiments, a method may include receiving, at the virtual machine, an indication that the computing device is requesting delivery of a web page, downloading, at the virtual machine, the web page, rendering, at the virtual machine, a first version of the web page, identifying, at the virtual machine, a presence of at least one advertisement element on the rendered first version of the web page, removing, at the virtual machine, the presence of the at least one advertisement element on the rendered first version of the web page, rendering, at the virtual machine, a second version of the web page that does not include the presence of the at least one advertisement element, and sending the second version of the web page that does not include the presence of the at least one advertisement element to the computing device.

    Systems and methods for stateless asynchronous database loading while maintaining ordering

    公开(公告)号:US11372844B1

    公开(公告)日:2022-06-28

    申请号:US16179871

    申请日:2018-11-02

    Abstract: The disclosed computer-implemented method for asynchronously and statelessly loading data while maintaining ordering may include parsing multiple data records, appending an identifier to each data record, where the appended identifier establishes a parsing order indicating an order in which each data record was parsed, inserting the parsed data records into multiple persistent queues in parallel, and asynchronously loading the data records from the persistent queues into a database in parallel according to the appended identifiers. As such, the data records may be stored in the database in the established parsing order. Various other methods, systems, and computer-readable media are also disclosed.

    Analyzing and mitigating privacy issues on a computing device using cookie generation flows

    公开(公告)号:US11354440B1

    公开(公告)日:2022-06-07

    申请号:US16449116

    申请日:2019-06-21

    Abstract: Analyzing and mitigating privacy issues on a computing device using cookie generation flows. The method includes initiating a headless web browser, monitoring a request made of a website accessed by the headless web browser, monitoring scripts created on the website, instrumenting a function used to create a cookie on the computing device, tracing an initial generation of a call used to create the cookie on the computing device, obtaining a cookie generation flow related to the creation of the cookie, and initiating a security action based on obtaining the cookie generation flow.

    Identifying and protecting against surveillance apps installed on client devices

    公开(公告)号:US11295015B1

    公开(公告)日:2022-04-05

    申请号:US16286050

    申请日:2019-02-26

    Abstract: Identifying and protecting against malicious apps installed on client devices. In some embodiments, a method may include (a) identifying client devices, (b) identifying apps installed on the client devices, (c) assigning each of the apps known to be a malicious app with a highest app suspicion score, (d) assigning each of the other apps as an unknown app with a lowest app suspicion score, (e) assigning each of the client devices with a device suspicion score, (f) assigning each of the unknown apps with an updated app suspicion score, (g) repeating (e), and repeating (f) with a normalization, until the device suspicion scores and the app suspicion scores converge within a convergence threshold, (h) identifying one of the unknown apps as a malicious app, and (i) protecting against the malicious app by directing performance of a remedial action to protect the client device from the malicious app.

    Systems and methods for crowd-storing encrypiion keys

    公开(公告)号:US11184169B1

    公开(公告)日:2021-11-23

    申请号:US16231887

    申请日:2018-12-24

    Abstract: The disclosed computer-implemented method for crowd-storing encryption keys may include (i) sending, from a client computing device and to a server, a recovery request, (ii) creating a first public-private key pair, (iii) receiving a plurality of encrypted shares of an encryption key from the server in response to the recovery request, where the encrypted shares are encrypted with a first public key of the first public-private key pair, and (iv) performing a security action including (A) decrypting the plurality of encrypted shares of the encryption key with a first private key of the first public-private key pair and (B) recovering the encryption key from the decrypted plurality of shares of the encryption key. Various other methods, systems, and computer-readable media are also disclosed.

    Systems and methods for identifying cybersecurity status based on an ontology of vault items

    公开(公告)号:US11163872B1

    公开(公告)日:2021-11-02

    申请号:US16298383

    申请日:2019-03-11

    Abstract: The disclosed computer-implemented method for identifying cybersecurity status based on an ontology of vault items may include (i) identifying, at a computing device, the ontology of a plurality of vault items and (ii) performing a security action including (A) calculating, based on the ontology, a respective impact score for each vault item in the plurality of vault items and (B) calculating a master score of a plurality of passwords from (I) a respective password strength of each password in the plurality of passwords and (II) the respective impact score for each vault item associated with each password in the plurality of passwords. Various other methods, systems, and computer-readable media are also disclosed.

    Systems and methods to detect and prevent auto-click attacks

    公开(公告)号:US11157621B1

    公开(公告)日:2021-10-26

    申请号:US16211787

    申请日:2018-12-06

    Abstract: The disclosed computer-implemented method for detecting and preventing auto-click attacks may include (1) detecting, by the computing device, a click input, (2) detecting, by the computing device, a finger in proximity to the computing device, (3) analyzing, by the computing device, at least one event associated with the finger, (4) determining, by the computing device, that the click input is an auto-click based on the analysis of the at least one event associated with the finger, and (5) performing a security action in response to determining that the click input is an auto-click. Various other methods, systems, and computer-readable media are also disclosed.

    Systems and methods for providing single sign-on capability

    公开(公告)号:US11140145B1

    公开(公告)日:2021-10-05

    申请号:US16017077

    申请日:2018-06-25

    Abstract: The disclosed computer-implemented method for providing single sign-on capability may include intercepting, during an authentication session with a network resource, a single sign-on request generated by an application executing on a computing device, redirecting the single sign-on request to a separate computing device for execution, receiving, in response to authentication of at least one user credential from the separate computing device, an authentication decision that the separate computing device obtained from an identity provider (IDP) by executing the single sign-on request and injecting the authentication decision received from the separate computing device into the application where the single sign-on request was originally generated to complete the authentication session.

    Systems and methods for providing secure access to vulnerable networked devices

    公开(公告)号:US11128665B1

    公开(公告)日:2021-09-21

    申请号:US16123622

    申请日:2018-09-06

    Abstract: The disclosed computer-implemented method for providing secure access to vulnerable networked devices may include identifying a vulnerable network device connected to a local network, identifying local network traffic destined for the vulnerable network device and that has been tagged as safe, passing the local network traffic tagged as safe to the vulnerable network device, and performing a security action on local network traffic destined for the vulnerable network device that has not been tagged as safe. Various other methods, systems, and computer-readable media are also disclosed.

Patent Agency Ranking